Static task
static1
Behavioral task
behavioral1
Sample
4227b4a69a56d9d57c6594de8056eda2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4227b4a69a56d9d57c6594de8056eda2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4227b4a69a56d9d57c6594de8056eda2_JaffaCakes118
-
Size
92KB
-
MD5
4227b4a69a56d9d57c6594de8056eda2
-
SHA1
e7df0dde0061bcdc2046f4a3e4f1a9a7c2295239
-
SHA256
080ac1649198fe5c682340eb5fbb82c32fbf34d9da085b7abc26b4ea2aa5b478
-
SHA512
a9a7bc752af530fb64fa6e9ddabc68c4b13c2b5a14a24f9e44bd8af1909b80c38c06d93bd3768bfa9dae6e61d9eebbf803d5953a05d8fe1a3612777171ff4532
-
SSDEEP
1536:R3yuUAiZrz3EJcgVpsOqh7u/jGPYPyaL70FtPkpRMoIO6nToIfZfRH2ba5qusP:RUJrz3yvsrh6KPYfu8pnWTBfZfRH2+5w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4227b4a69a56d9d57c6594de8056eda2_JaffaCakes118
Files
-
4227b4a69a56d9d57c6594de8056eda2_JaffaCakes118.dll windows:4 windows x86 arch:x86
dd7de2f61392800cdc300c517b89ad8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Toolhelp32ReadProcessMemory
OpenProcess
Module32Next
Module32First
Heap32ListNext
Heap32ListFirst
TerminateProcess
GetVersion
LocalAlloc
GetTickCount
GetCurrentProcess
GetCurrentThreadId
GetVersionExA
GetSystemInfo
FreeLibrary
GetWindowsDirectoryA
GetComputerNameA
GlobalMemoryStatus
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcmpA
GetModuleFileNameA
Thread32First
Thread32Next
LocalFree
lstrcpyA
CreateThread
lstrcatA
ExpandEnvironmentStringsA
DeviceIoControl
LoadLibraryA
GetProcAddress
ResetEvent
GetFileAttributesExA
CreateDirectoryA
CreateFileA
RemoveDirectoryW
lstrlenA
DeleteFileW
SetFileAttributesA
GetLastError
CreateProcessW
GetFileAttributesExW
SetErrorMode
GetDriveTypeW
GetDiskFreeSpaceExW
CreateDirectoryW
CreateFileW
FindFirstFileW
FindNextFileW
CloseHandle
FindClose
SetFileAttributesW
MoveFileW
GetFileAttributesW
QueryPerformanceCounter
QueryPerformanceFrequency
PeekNamedPipe
ReadFile
WriteFile
SetEvent
CreateEventA
WaitForSingleObject
DeleteFileA
Sleep
CopyFileA
CreatePipe
GetSystemDirectoryA
GetStartupInfoA
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
gdi32
SelectPalette
RealizePalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateDCA
GetDeviceCaps
DeleteDC
GetStockObject
advapi32
RegEnumValueA
ImpersonateLoggedOnUser
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
DeleteService
StartServiceA
QueryServiceStatus
ControlService
ChangeServiceConfig2A
LockServiceDatabase
UnlockServiceDatabase
ChangeServiceConfigA
EnumServicesStatusExA
OpenServiceA
QueryServiceConfigA
QueryServiceConfig2A
CloseServiceHandle
OpenSCManagerA
RegSaveKeyA
RegDeleteValueA
RegCreateKeyExA
RegQueryInfoKeyA
CreateProcessAsUserA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyExA
RevertToSelf
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegSetValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptEncrypt
user32
GetDC
ReleaseDC
wsprintfA
CloseWindowStation
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenInputDesktop
SetCursorPos
OpenDesktopA
DispatchMessageA
CloseDesktop
GetKeyState
CallNextHookEx
GetForegroundWindow
GetWindowTextW
UnhookWindowsHookEx
SetWindowsHookExA
keybd_event
mouse_event
ExitWindowsEx
TranslateMessage
GetUserObjectInformationA
SetThreadDesktop
GetMessageA
urlmon
URLDownloadToCacheFileA
msvcrt
wcscmp
_strnicmp
_wcsnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
fputc
_errno
_fdopen
ftell
_ui64toa
ceil
_vsnprintf
memcmp
_CxxThrowException
swprintf
time
localtime
fwprintf
wcsftime
_strlwr
_mbsrchr
strcmp
__CxxFrameHandler
_EH_prolog
_mbsnbcat
strlen
fclose
fwrite
fseek
fread
fopen
_beginthreadex
strncmp
free
memset
malloc
??2@YAPAXI@Z
_except_handler3
memcpy
??3@YAXPAX@Z
_ftol
sprintf
memmove
_stricmp
wcslen
strcat
strcpy
wcscat
wcscpy
_wfopen
_itoa
strncpy
strstr
atoi
fprintf
shell32
ord680
psapi
GetModuleFileNameExA
EnumProcessModules
netapi32
Netbios
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ